Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/12/2024, 18:08
Behavioral task
behavioral1
Sample
Sigmanly_bdd775603c502c44f8fcb4ba3edcde48a6c6b188f20cc76b9b662cc6c7a284c0.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Sigmanly_bdd775603c502c44f8fcb4ba3edcde48a6c6b188f20cc76b9b662cc6c7a284c0.dll
Resource
win10v2004-20241007-en
General
-
Target
Sigmanly_bdd775603c502c44f8fcb4ba3edcde48a6c6b188f20cc76b9b662cc6c7a284c0.dll
-
Size
30.5MB
-
MD5
458c377c22340ea17a942ab200c063ae
-
SHA1
5c69e074616448b725250b7181102318f986239b
-
SHA256
bdd775603c502c44f8fcb4ba3edcde48a6c6b188f20cc76b9b662cc6c7a284c0
-
SHA512
82105cc7477b4cf208067324358ff6fb5c4a80da881eb7dfcd74551fc5d5cb757f02b1a6ed5da0c3b79770d7c1a195cb65473df04272b405e6dc4a32ae32a7f0
-
SSDEEP
393216:NpjeWRbosw2LgMubfSEh8XASixsd2mz5KP6AGP5U7dKgw:NteilDE3bKwSIsd2m+5vdKR
Malware Config
Signatures
-
Detects Grandoreiro payload 5 IoCs
resource yara_rule behavioral2/memory/4048-1-0x00000000029D0000-0x0000000004868000-memory.dmp family_grandoreiro_v1 behavioral2/memory/4048-2-0x00000000029D0000-0x0000000004868000-memory.dmp family_grandoreiro_v1 behavioral2/memory/4048-9-0x00000000029D0000-0x0000000004868000-memory.dmp family_grandoreiro_v1 behavioral2/memory/4048-11-0x00000000029D0000-0x0000000004868000-memory.dmp family_grandoreiro_v1 behavioral2/memory/4048-12-0x00000000029D0000-0x0000000004868000-memory.dmp family_grandoreiro_v1 -
Grandoreiro
Part of a group of banking trojans, targeting Spanish and Portuguese speaking countries.
-
Grandoreiro family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4048 rundll32.exe 4048 rundll32.exe 4048 rundll32.exe 4048 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3208 wrote to memory of 4048 3208 rundll32.exe 82 PID 3208 wrote to memory of 4048 3208 rundll32.exe 82 PID 3208 wrote to memory of 4048 3208 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Sigmanly_bdd775603c502c44f8fcb4ba3edcde48a6c6b188f20cc76b9b662cc6c7a284c0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Sigmanly_bdd775603c502c44f8fcb4ba3edcde48a6c6b188f20cc76b9b662cc6c7a284c0.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4048
-